Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim’s computer remotely. RATs allow threat actors to execute the following malicious actions while remaining hidden from the victim:- Recently, cybersecurity researchers at Cisco Talos discovered a malicious campaign that was found to be delivering a new RAT that’s been dubbed
The post New SugarGh0st RAT Delivered via Malicious Windows Shortcut & JavaScript appeared first on Cyber Security News. Read More
Posted inResearch